diff options
-rw-r--r-- | src/arch/arm64/Kconfig | 9 | ||||
-rw-r--r-- | src/arch/arm64/Makefile.mk | 9 |
2 files changed, 18 insertions, 0 deletions
diff --git a/src/arch/arm64/Kconfig b/src/arch/arm64/Kconfig index 2d71067e45..af5050b21b 100644 --- a/src/arch/arm64/Kconfig +++ b/src/arch/arm64/Kconfig @@ -46,6 +46,15 @@ config ARM64_USE_ARM_TRUSTED_FIRMWARE default n depends on ARCH_RAMSTAGE_ARM64 && ARM64_CURRENT_EL = 3 +config ARM64_BL31_OPTEE_WITH_SMC + bool "Build OP-TEE dispatcher for BL31 and allow loading via an SMC" + default n + depends on ARM64_USE_ARM_TRUSTED_FIRMWARE + help + This option adds support for building the OP-TEE Secure Payload Dispatcher + (SPD) for BL31, and allows loading the OP-TEE image via a Secure Monitor Call + (SMC). + config ARM64_BL31_EXTERNAL_FILE string "Path to external BL31.ELF (leave empty to build from source)" depends on ARM64_USE_ARM_TRUSTED_FIRMWARE diff --git a/src/arch/arm64/Makefile.mk b/src/arch/arm64/Makefile.mk index 6499283c08..cb43897efd 100644 --- a/src/arch/arm64/Makefile.mk +++ b/src/arch/arm64/Makefile.mk @@ -185,6 +185,15 @@ BL31_MAKEARGS += IS_ANYTHING_TO_BUILD=1 # Set a consistent build timestamp: the same coreboot has BL31_MAKEARGS += BUILD_MESSAGE_TIMESTAMP='"$(shell sed -n 's/^.define COREBOOT_BUILD\>.*"\(.*\)".*/\1/p' $(obj)/build.h)"' +ifeq ($(CONFIG_ARM64_BL31_OPTEE_WITH_SMC),y) +BL31_MAKEARGS += SPD=opteed +BL31_MAKEARGS += OPTEE_ALLOW_SMC_LOAD=1 +BL31_MAKEARGS += PLAT_XLAT_TABLES_DYNAMIC=1 +ifeq ($(CONFIG_CHROMEOS),y) +BL31_MAKEARGS += CROS_WIDEVINE_SMC=1 +endif +endif # CONFIG_ARM64_BL31_OPTEE_WITH_SMC + BL31_CFLAGS := -fno-pic -fno-stack-protector -Wno-deprecated-declarations -Wno-unused-function BL31_LDFLAGS := -Wl,--emit-relocs |